CN101923701B - Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology - Google Patents

Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology Download PDF

Info

Publication number
CN101923701B
CN101923701B CN2010102302347A CN201010230234A CN101923701B CN 101923701 B CN101923701 B CN 101923701B CN 2010102302347 A CN2010102302347 A CN 2010102302347A CN 201010230234 A CN201010230234 A CN 201010230234A CN 101923701 B CN101923701 B CN 101923701B
Authority
CN
China
Prior art keywords
watermark
printed matter
piecemeal
information
bar code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010102302347A
Other languages
Chinese (zh)
Other versions
CN101923701A (en
Inventor
王慧琴
王凌云
赵敏
王可
雷洁
茅世豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Architecture and Technology
Original Assignee
Xian University of Architecture and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Architecture and Technology filed Critical Xian University of Architecture and Technology
Priority to CN2010102302347A priority Critical patent/CN101923701B/en
Publication of CN101923701A publication Critical patent/CN101923701A/en
Application granted granted Critical
Publication of CN101923701B publication Critical patent/CN101923701B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an anti-counterfeiting authentication method of an anti-counterfeiting image of printed matter based on a digital watermarking technology. Most of encryption technologies and digital watermarking technologies only provide an anti-counterfeiting function for the digital field of an image and can not resist geometric attacks and attacks similar to printing, scanning, and the like. The method comprises the following steps of: firstly, processing a two-value bar code, and embedding the two-value bar code into a carrier image; then, printing once to form authorized printed matter; taking a picture of the printed matter by using a mobile phone, uploading the picture to an authentication center, and reading the watermark by using a detection algorithm to identify the authenticity of the printed matter so as to achieve the anti-counterfeiting purpose. Because the watermark embedded in the printed matter is invisible, the watermark has good invisibility and safety. The invention realizes the detection by using the mobile phone and has the advantages of equipment convenience, mobility, broad application prospect, and the like.

Description

Anti-counterfeiting authentication method based on the anti-counterfeiting image of printed matter of digital watermark technology
Technical field
The invention belongs to false proof and field of information security technology; Be particularly related to and be used for printed matter anti-counterfeiting; A part of choosing the two-value bar code is embedded in the protected printed matter as watermark; Utilize mobile phone that the printed matter that contains watermark is taken pictures then, realize the anti-counterfeiting authentication method of certified products and the anti-counterfeiting image of printed matter of the discriminating of imitative article through wireless network transmissions after the Verification System.
Background technology
The numerical information revolution has brought deep variation for human society and life, has also brought new challenge and innovation opportunity simultaneously.Multimedia technology and development of internet technology make that electronic publications such as digitized voice, text, image, music and video can be obtained rapidly and accurately, transmit and store, and these have become information interchange, especially the important way of network information interchange.Yet the image that we contact at ordinary times, most of still the passing through of literal are printed output, like branded goods packing, certificate, video and audio products front cover, currency, bill, business card, passport or the like.Though the traditional printing technical guarantee homogeneity of printed matter, the personator still can duplicate these printing packaging article by the operating type of routine easily, has upset market order, grievous injury the producer and consumer's legitimate rights and interests.
Digital watermarking is paid close attention to as a kind of potential solution widely, and becomes popular research field of domestic and international academia.Digital watermarking is through in multi-medium data, adding some numerical information to reach functions such as file real and fake discrimination, copyright protection; The watermark information that embeds does not influence the integrality of source document; Can be through detecting or extract the authenticity of watermark information documentary evidence; Can reach good antifalse effect, can reduce cost effectively again.Protect the anti-counterfeiting technology of digital information to compare with traditional being only applicable to; Digital watermark technology is applied to printed matter or the false proof field of the packing of product; Have practical, detection speed is fast, safe, characteristics such as cost is low, makes application prospect more wide.
Bar code can indicate the information such as date of manufacture, trade name, classification and price of commodity.Secret note that common bar code is differed greatly by reflectivity (abbreviation bar) and informal voucher (being called for short empty) are formed; In view of it is made easily; Information acquisition speed is fast, and assay device structures is simple, characteristics such as low and easy repair of cost; Therefore, adopting two-dimensional bar code is a kind of application widely as practical application of watermarks.
Most of encryption technologies and digital watermark method only provide the antiforge function of numeric field to image, can not resist geometric attack and be similar to the print scanned attack of Denging.If the image behind the embed watermark is transmitted with the paper-based form after printing; When detecting watermark information through detection system; Watermark has been experienced digital-to-analogue-analog-digital conversion process such as printing/print, scan/take pictures with image; Simultaneously, this process has been introduced much noise (like scanning jittering noise, thermonoise, random noise etc.), makes watermark before extraction, receive destruction to a great extent.Digital watermark technology is applied to printed matter anti-counterfeiting; Not only require the algorithm invisibility better; And require algorithm to resist once to print/print, scan/information loss that the process of taking pictures is brought; Require simultaneously to secondary print/print, scan/after taking pictures, product no longer contains effective watermark, this makes the application of digital watermark technology in the antiforge field become more challenging.
Summary of the invention
The technical matters that the present invention solved provides a kind of can the opposing once and prints/print, scans/information loss that the process of taking pictures has been brought; And secondary is printed/print, scan/after taking pictures; Watermark information will be lost; Not only have the truth identification function, also have the anti-anti-counterfeiting authentication method of forging the anti-counterfeiting image of printed matter of effect simultaneously.
For solving above-mentioned technical matters, the technical scheme that the present invention takes:
Figure 95243DEST_PATH_IMAGE001
special character of the present invention is: after at first the two-value bar code being handled; Be embedded into carrier image; Then, after once printing, become legal printed matter; Utilize mobile phone to take pictures to printed matter and upload to authentication center, utilize detection algorithm to read watermark,, thereby reach false proof purpose with the true and false of discriminating printed matter.
Above-mentioned anti-counterfeiting authentication method is realized through following steps: the generation of (1), two-value bar code:
Original bar code W is pruned processing, be divided into the watermark partial information W1 of embedding and the watermark partial information W2 of reservation, wherein; The size of the watermark partial information W1 that embeds is 54% of original bar code W; It is embedded in the carrier image, plays the effect of copyright proof, then through being extracted watermark information W1 ' the carrier image of method of detecting watermarks after quilt is taken pictures; It is merged formation bar code W ' with the watermark partial information W2 that keeps; Adopt maximum membership grade principle at last, W ' revises to bar code, obtains revised two-value bar code watermarking images;
(2), the generation of anti-counterfeiting image:
Magnitude relationship according to carrier image and the resulting two-value bar code of step (1) watermarking images is carried out carrier image
Figure 56246DEST_PATH_IMAGE002
Piecemeal carries out discrete cosine transform to each piecemeal, obtains piecemeal DCT matrix of coefficients; The coefficient value of each piecemeal DCT matrix of coefficients is sorted according to Zig-Zag, and the reference position of choosing the watermark of embedding does , the length of embedding does
Figure 166471DEST_PATH_IMAGE004
, the DCT coefficient of each piecemeal is repeatedly embedded
Figure 2010102302347100002DEST_PATH_IMAGE005
Inferior 1bit information establishes that the one dimensional system matrix number by the Zig-Zag ordering does behind the piecemeal
Figure 747625DEST_PATH_IMAGE006
, wherein t=1,2,3 ..., n * n; i=1,2,3 ..., k* k, because the less DCT index variation of amplitude is more obvious before and after printing, therefore, before carrying out watermark and embedding elder generation to selected coefficient in the less coefficient of amplitude revise, the amplitude intensity of establishing modification does
Figure 269742DEST_PATH_IMAGE007
, , when the absolute value of the amplitude of selected coefficient less than
Figure 15161DEST_PATH_IMAGE007
, then the amplitude with coefficient is revised as
Figure 44297DEST_PATH_IMAGE007
, sign is constant, and the embed watermark information of wanting that a certain piecemeal is corresponding is 1 o'clock, revises coefficient and satisfies:
Figure 737315DEST_PATH_IMAGE009
When wanting embed watermark information to be 0, revise coefficient and satisfy:
Be enough to two formula if be discontented with; Then revise a less symbol of absolute value in and ; Make it satisfy following formula; According to top embedding grammar, whole binary bitmap is embedded into the DCT territory of original image; DCT matrix of coefficients to having embedded watermark information carries out the piecemeal inverse discrete cosine transformation, can obtain the anti-counterfeiting image of embed watermark information;
(3), watermark detection process:
Use the mobile phone with camera function that printed matter is taken to the printed matter that circulates in market, photographic images is uploaded to authentication center through Net-connected computer or mobile network, authentication center starts watermark detection module and detects:
Doubtful digital picture to after taking pictures is carried out
Figure 255704DEST_PATH_IMAGE002
Piecemeal, each piece carries out dct transform, obtains piecemeal DCT matrix of coefficients, to each piecemeal dct transform and by the coefficient one dimension matrix after the Zig-Zag ordering does
Figure 631322DEST_PATH_IMAGE013
, wherein t=1,2,3 ..., n * n; i=1,2,3 ..., k* k, for each piecemeal, only extract the watermark information of 1bit, if
Figure 707731DEST_PATH_IMAGE014
, the watermark information that then extracts is 1, if
Figure 711459DEST_PATH_IMAGE015
The watermark information that then extracts is 0; The watermarking images that calculating proposes from picture according to the normalization calculating formula of similarity at last and the similarity of original watermark image, the threshold value that only extracts the similarity of watermark reaches at 86% o'clock, thinks that just watermark extracting is successful; Assert that this printed matter is a genuine piece, otherwise the explanation printed matter is pseudo-article.
Error code may appear in the bar code watermark information that extracts in the above-mentioned step (3); Bar code watermark to extracting is corrected through maximum membership grade principle in the fuzzy mathematics theory; Its process is following: definition extracts watermark for
Figure 965854DEST_PATH_IMAGE016
, and it is that 1 degree of membership does to watermark information
Figure 422243DEST_PATH_IMAGE017
; ;, watermark information is 1 number
Figure 382612DEST_PATH_IMAGE020
in
Figure 567103DEST_PATH_IMAGE019
To watermark information is that 0 degree of membership does
Figure 982089DEST_PATH_IMAGE017
;
Figure 151034DEST_PATH_IMAGE018
;, watermark information is 0 number
Figure 974819DEST_PATH_IMAGE020
in
Figure 863775DEST_PATH_IMAGE019
If watermark information is 1 degree of membership is 0 degree of membership greater than watermark information; Then judging
Figure 405800DEST_PATH_IMAGE016
is 1, otherwise is 0.
Compared with prior art, beneficial effect of the present invention:
1. the printed matter anti-counterfeiting technology based on the mobile phone photograph authentication has the not available peculiar property of a lot of traditional anti-counterfeiting printing technologies: because the watermark that embeds in the printed matter is sightless; Therefore hide property, security is good; Utilize mobile phone to realize detecting; Equipment is convenient, has mobility etc., has broad application prospects.
2. realized special antiforge function: can resist once and print/print, scan/information loss that the process of taking pictures has been brought; And secondary is printed/print, scan/after taking pictures; Watermark information will be lost, and not only have the truth identification function, also have the anti-effect of forging simultaneously.
3. with respect to traditional printed matter anti-counterfeiting; The present invention is according to human vision property; Be chosen in frequency field to the insensitive zone of image vision, embed two-value bar code watermark, guarantee that the image vision difference before and after the embed watermark is minimum through the positive negativity of revising coefficient symbols.
4. before watermark embeds, earlier watermark bar code is pruned pre-service; When watermark extracting, adopt maximum membership grade principle that bar code is revised, above measure has guaranteed that image can recover watermark information to greatest extent receiving under the extraneous different attack condition.
Description of drawings
Fig. 1 prunes exploded view for watermark;
Fig. 2 is watermark replacement exploded view;
Fig. 3 is watermark embedding and detection system block diagram;
Fig. 4 is the service-user process flow diagram flow chart.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is elaborated.
After
Figure 909594DEST_PATH_IMAGE001
the present invention at first handles the two-value bar code; Be embedded into carrier image; Then, after once printing, become legal printed matter; Utilize mobile phone to take pictures to printed matter and upload to authentication center, utilize detection algorithm to read watermark,, thereby reach false proof purpose with the true and false of discriminating printed matter.
As shown in Figure 4, based on the implementation process of mobile phone photograph authenticated printing article Antiforge system, be divided into following step and describe: accomplish that 1) watermark information is embedded image to be protected; 2), use the mobile phone or the digital camera of band camera function the printed matter watermark information is gathered through printing/printing treatment; 3) information that collects is sent to authentication center after, detect the printed matter true and false through detection system, and the result fed back in the user.The practical implementation step is following:
(1), the generation of two-value bar code:
Original bar code W is pruned processing, as shown in Figure 1, be divided into the watermark partial information W1 of embedding and the watermark partial information W2 of reservation; Wherein, as shown in Figure 2, the size of embed watermark partial information W1 is 54% of original bar code W; It is embedded in the carrier image, plays the effect of copyright proof, then through extracting watermark information W1 ' the carrier image of method of detecting watermarks after taking pictures; It is merged formation bar code W ' with reservation watermark partial information W2; Adopt maximum membership grade principle at last, W ' is revised, obtain revised two-value bar code watermarking images.
(2), the generation of anti-counterfeiting image:
Magnitude relationship according to carrier image and the resulting two-value bar code of step (1) watermarking images is carried out carrier image
Figure 601475DEST_PATH_IMAGE002
Piecemeal carries out discrete cosine transform to each piecemeal, obtains piecemeal DCT matrix of coefficients; The coefficient value of each piecemeal DCT matrix of coefficients is sorted according to Zig-Zag, and the reference position of choosing the watermark of embedding does
Figure 758787DEST_PATH_IMAGE003
, the length of embedding does
Figure 552431DEST_PATH_IMAGE004
, the DCT coefficient of each piecemeal is repeatedly embedded
Figure 843604DEST_PATH_IMAGE005
Inferior 1bit information establishes that the one dimensional system matrix number by the Zig-Zag ordering does behind the piecemeal
Figure 530937DEST_PATH_IMAGE006
, wherein t=1,2,3 ..., n * n; i=1,2,3 ..., k* k, because the less DCT index variation of amplitude is more obvious before and after printing, therefore, before carrying out watermark and embedding elder generation to selected coefficient in the less coefficient of amplitude revise, the amplitude intensity of establishing modification does
Figure 734517DEST_PATH_IMAGE007
,
Figure 874511DEST_PATH_IMAGE008
, when the absolute value of the amplitude of selected coefficient less than , then the amplitude with coefficient is revised as
Figure 652160DEST_PATH_IMAGE007
, sign is constant, and the embed watermark information of wanting that a certain piecemeal is corresponding is 1 o'clock, revises coefficient and satisfies:
Figure 151274DEST_PATH_IMAGE009
(1)
When wanting embed watermark information to be 0, revise coefficient and satisfy:
Figure 914917DEST_PATH_IMAGE010
(2)
If do not satisfy formula (1) and formula (2); Then revise a less symbol of absolute value in
Figure 892101DEST_PATH_IMAGE011
and
Figure 960551DEST_PATH_IMAGE012
; Make it satisfy following formula; According to top embedding grammar, whole binary bitmap is embedded into the DCT territory of original image; DCT matrix of coefficients to having embedded watermark information carries out the piecemeal inverse discrete cosine transformation, can obtain the anti-counterfeiting image of embed watermark information;
When embed watermark, should consider the invisibility of algorithm, also to consider the robustness of algorithm.The present invention chooses three coefficients of watermarking algorithm; Be reference position
Figure 755200DEST_PATH_IMAGE003
; Insert length
Figure 869787DEST_PATH_IMAGE005
; Coefficient amplitude intensity is directly determining the invisibility and the robustness of anti-counterfeiting image.
Figure 698251DEST_PATH_IMAGE003
choosing too small the time; Embedded location is just near low frequency region; The robustness of watermark strengthens, but the invisibility of watermark simultaneously but reduces relatively; As
Figure 539168DEST_PATH_IMAGE003
choosing excessive the time; The position that embeds is just near high-frequency region; The invisibility of watermark strengthens, but robustness reduces.Therefore take all factors into consideration; This paper chooses medium and low frequency and comes embed watermark; I.e.
Figure 16417DEST_PATH_IMAGE021
chooses
Figure 256775DEST_PATH_IMAGE022
.
When
Figure 627713DEST_PATH_IMAGE005
is too small; Robustness reduces, and invisibility strengthens; When
Figure 514898DEST_PATH_IMAGE005
is excessive; Robustness strengthens; Invisibility reduces, the operation time of also having strengthened algorithm simultaneously.In addition; When choosing
Figure 338497DEST_PATH_IMAGE005
; Also to consider reference position
Figure 382545DEST_PATH_IMAGE003
; As
Figure 483357DEST_PATH_IMAGE003
during near Low Medium Frequency;
Figure 666076DEST_PATH_IMAGE005
chooses excessive; The position that watermark is embedded concentrates on high frequency; So not only can not strengthen the robustness of watermark, can reduce the robustness of watermark on the contrary.Therefore, choose
Figure 898343DEST_PATH_IMAGE022
.
For the 3rd coefficient amplitude intensity
Figure 700077DEST_PATH_IMAGE007
, then be in order to increase the robustness of algorithm.If it is too small then for the robustness that increases algorithm about-face too not, if
Figure 523863DEST_PATH_IMAGE007
excessive invisibility that then possibly reduce watermark because the amplitude of revising is excessive that
Figure 780029DEST_PATH_IMAGE007
gets.
(3), watermark detection process:
Use the mobile phone with camera function that printed matter is taken to the printed matter that circulates in market, photographic images is uploaded to authentication center through Net-connected computer or mobile network, authentication center starts watermark detection module and detects:
Doubtful digital picture to after taking pictures is carried out Piecemeal, each piece carries out dct transform, obtains piecemeal DCT matrix of coefficients, to each piecemeal dct transform and by the coefficient one dimension matrix after the Zig-Zag ordering does
Figure 193058DEST_PATH_IMAGE013
, wherein t=1,2,3 ..., n * n; i=1,2,3 ..., k* k, for each piecemeal, only extract the watermark information of 1bit, if , the watermark information that then extracts is 1, if
Figure 307831DEST_PATH_IMAGE015
The watermark information that then extracts is 0; The watermarking images that calculating proposes from picture according to the normalization calculating formula of similarity at last and the similarity of original watermark image, the threshold value that only extracts the similarity of watermark reaches at 86% o'clock, thinks that just watermark extracting is successful; This printed matter is a genuine piece, otherwise the explanation printed matter is pseudo-article.
Error code may appear in the bar code watermark information that extracts in the step (3); Bar code watermark to extracting is corrected through maximum membership grade principle in the fuzzy mathematics theory; Its process is following: definition extracts watermark for
Figure 203106DEST_PATH_IMAGE016
, and it is that 1 degree of membership does to watermark information
Figure 392648DEST_PATH_IMAGE017
;
Figure 447191DEST_PATH_IMAGE018
;, watermark information is 1 number in
Figure 17981DEST_PATH_IMAGE019
To watermark information is that 0 degree of membership does
Figure 518418DEST_PATH_IMAGE017
; ;, watermark information is 0 number
Figure 85032DEST_PATH_IMAGE020
in
Figure 90531DEST_PATH_IMAGE019
If watermark information is 1 degree of membership is 0 degree of membership greater than watermark information; Then judging
Figure 835950DEST_PATH_IMAGE016
is 1, otherwise is 0.
Referring to Fig. 4, service-user process of the present invention:
The user carries out the true and false when distinguishing at needs to this print product is arranged, and can provide two kinds of methods to realize:
1) user can use the mobile phone with camera function printed matter is taken; Photographic images is uploaded images onto authentication center's application through mobile network platform detect commodity true and false; After watermark is extracted to image in center to be certified; Relevant information is returned mobile network platform, by mobile network platform the result is beamed back inquiring user with the note form again.
[0025] 2), can download watermark detection software, the real-time detection printed matter true and false through the Internet network authentication center of visit manufacturing enterprise for the cellphone subscriber who supports the JAVA program.

Claims (2)

1. based on the anti-counterfeiting authentication method of the anti-counterfeiting image of printed matter of digital watermark technology, it is characterized in that: after at first the two-value bar code being handled, be embedded into carrier image, then, after once printing, become legal printed matter; Utilize mobile phone to take pictures to printed matter and upload to authentication center, utilize detection algorithm to read watermark,, thereby reach false proof purpose with the true and false of discriminating printed matter;
Specifically realize: the generation of (1), two-value bar code by following steps:
Original bar code W is pruned processing, be divided into the watermark partial information W1 of embedding and the watermark partial information W2 of reservation, wherein; The size of the watermark partial information W1 that embeds is 54% of original bar code W; It is embedded in the carrier image, plays the effect of copyright proof, then through being extracted watermark information W1 ' the carrier image of method of detecting watermarks after quilt is taken pictures; It is merged formation bar code W ' with the watermark partial information W2 that keeps; Adopt maximum membership grade principle at last, W ' revises to bar code, obtains revised two-value bar code watermarking images;
(2), the generation of anti-counterfeiting image:
Magnitude relationship according to carrier image and the resulting two-value bar code of step (1) watermarking images is carried out carrier image
Figure 2010102302347100001DEST_PATH_IMAGE001
Piecemeal carries out discrete cosine transform to each piecemeal, obtains piecemeal DCT matrix of coefficients; The coefficient value of each piecemeal DCT matrix of coefficients is sorted according to Zig-Zag, and the reference position of choosing the watermark of embedding does
Figure 336524DEST_PATH_IMAGE002
, the length of embedding does , the DCT coefficient of each piecemeal is repeatedly embedded
Figure 2010102302347100001DEST_PATH_IMAGE005
Inferior 1bit information establishes that the one dimensional system matrix number by the Zig-Zag ordering does behind the piecemeal
Figure 454521DEST_PATH_IMAGE006
, wherein t=1,2,3 ..., n * n; i=1,2,3 ..., k* k, because the less DCT index variation of amplitude is more obvious before and after printing, therefore, before carrying out watermark and embedding elder generation to selected coefficient in the less coefficient of amplitude revise, the amplitude intensity of establishing modification does
Figure 2010102302347100001DEST_PATH_IMAGE007
,
Figure 740009DEST_PATH_IMAGE008
, when the absolute value of the amplitude of selected coefficient less than
Figure 70496DEST_PATH_IMAGE007
, then the amplitude with coefficient is revised as , sign is constant, and the embed watermark information of wanting that a certain piecemeal is corresponding is 1 o'clock, revises coefficient and satisfies:
Figure DEST_PATH_IMAGE009
When wanting embed watermark information to be 0, revise coefficient and satisfy:
Figure 679518DEST_PATH_IMAGE010
Be enough to two formula if be discontented with; Then revise a less symbol of absolute value in
Figure DEST_PATH_IMAGE011
and
Figure 983460DEST_PATH_IMAGE012
; Make it satisfy following formula; According to top embedding grammar, whole binary bitmap is embedded into the DCT territory of original image; DCT matrix of coefficients to having embedded watermark information carries out the piecemeal inverse discrete cosine transformation, can obtain the anti-counterfeiting image of embed watermark information;
(3), watermark detection process:
Use the mobile phone with camera function that printed matter is taken to the printed matter that circulates in market, photographic images is uploaded to authentication center through Net-connected computer or mobile network, authentication center starts watermark detection module and detects:
Doubtful digital picture to after taking pictures is carried out
Figure 320901DEST_PATH_IMAGE001
Piecemeal, each piece carries out dct transform, obtains piecemeal DCT matrix of coefficients, to each piecemeal dct transform and by the coefficient one dimension matrix after the Zig-Zag ordering does
Figure DEST_PATH_IMAGE013
, wherein t=1,2,3 ..., n * n; i=1,2,3 ..., k* k, for each piecemeal, only extract the watermark information of 1bit, if
Figure 26689DEST_PATH_IMAGE014
, the watermark information that then extracts is 1, if
Figure DEST_PATH_IMAGE015
The watermark information that then extracts is 0; The watermarking images that calculating proposes from picture according to the normalization calculating formula of similarity at last and the similarity of original watermark image, the threshold value that only extracts the similarity of watermark reaches at 86% o'clock, thinks that just watermark extracting is successful; Assert that this printed matter is a genuine piece, otherwise the explanation printed matter is pseudo-article.
2. the method for claim 1; It is characterized in that: error code may appear in the bar code watermark information that extracts in the described step (3); Bar code watermark to extracting is corrected through maximum membership grade principle in the fuzzy mathematics theory; Its process is following: definition extracts watermark for , and it is that 1 degree of membership does to watermark information
Figure DEST_PATH_IMAGE017
;
Figure 277727DEST_PATH_IMAGE018
;, watermark information is 1 number
Figure 543493DEST_PATH_IMAGE020
in
Figure DEST_PATH_IMAGE019
To watermark information is that 0 degree of membership does
Figure 634945DEST_PATH_IMAGE017
;
Figure 468909DEST_PATH_IMAGE018
;, watermark information is 0 number
Figure 833211DEST_PATH_IMAGE020
in
If watermark information is 1 degree of membership is 0 degree of membership greater than watermark information; Then judging
Figure 790889DEST_PATH_IMAGE016
is 1, otherwise is 0.
CN2010102302347A 2010-07-19 2010-07-19 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology Expired - Fee Related CN101923701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102302347A CN101923701B (en) 2010-07-19 2010-07-19 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102302347A CN101923701B (en) 2010-07-19 2010-07-19 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology

Publications (2)

Publication Number Publication Date
CN101923701A CN101923701A (en) 2010-12-22
CN101923701B true CN101923701B (en) 2012-05-09

Family

ID=43338612

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102302347A Expired - Fee Related CN101923701B (en) 2010-07-19 2010-07-19 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology

Country Status (1)

Country Link
CN (1) CN101923701B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102081788B (en) * 2011-01-11 2012-07-25 浙江工商大学 Robust zero-watermarking algorithm against dual print-and-scan based on direct coefficient comparison
CN103065073B (en) * 2013-01-25 2016-05-25 山东大学 A kind of method for anti-counterfeit of the digital printed product based on digital watermark technology
CN103853968B (en) * 2014-02-28 2017-05-10 百度在线网络技术(北京)有限公司 Method and device for generating verification code picture and verification method and device thereof
CN104010195A (en) * 2014-03-21 2014-08-27 付强 Anti-copying coded image, anti-copying coded image system and application
US9760818B2 (en) * 2014-04-29 2017-09-12 Hewlett-Packard Development Company, L.P. Machine-readable watermarks and barcodes in images
CN104182882B (en) * 2014-08-05 2018-01-12 付强 A kind of product digital watermark anti-fake anti-channel conflict information and its application process
CN104867098A (en) * 2015-05-26 2015-08-26 济南大学 Electronic certificate false proof and identification method based on digit watermarking
CN106327416B (en) * 2016-08-24 2019-11-26 北京印刷学院 A kind of site water mark method based on printed matter
CN106779740A (en) * 2016-12-02 2017-05-31 覃勇 A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach
CN107633410B (en) * 2017-07-16 2021-02-19 广州矽云信息科技有限公司 Error correction system and method for double-code anti-counterfeiting
WO2019095170A1 (en) * 2017-11-15 2019-05-23 深圳大学 Two-dimensional code generation method, two-dimensional code decoding method, and terminal
CN107909133B (en) * 2017-11-15 2021-01-19 深圳大学 Two-dimensional code generation method, two-dimensional code decoding method and terminal
CN108615218B (en) * 2018-05-02 2022-02-15 北京印刷学院 Printed quantum dot watermark detection method based on pseudo-random information spatial modulation
CN109146520A (en) * 2018-08-17 2019-01-04 珠海丹德图像技术有限公司 A kind of Comodity anti-fake system and method based on image information safe practice
CN111284157B (en) * 2018-12-10 2023-05-30 蒲亦非 Commodity package anti-counterfeiting printing and verifying method based on fractional order steganography technology
CN110189241B (en) * 2019-04-26 2023-01-31 江苏水印科技有限公司 Block mean value-based anti-printing noise image watermarking method
CN110751591B (en) * 2019-09-16 2023-04-07 北卡科技有限公司 Self-adaptive color image steganography method based on fuzzy inference system
CN112668954B (en) * 2020-09-03 2023-09-26 浙江万里学院 Logistics mail receiving information acquisition method based on mobile terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1421814A (en) * 2001-11-30 2003-06-04 温天 Digital anti-fake method
CN1512438A (en) * 2002-12-30 2004-07-14 北京邮电大学 File anti-fake method and its device based on digital water print
CN1710577A (en) * 2005-07-08 2005-12-21 王树勋 Digit water-mark certificate anti-fake method based on mobile communication network
CN1828666A (en) * 2006-04-12 2006-09-06 上海理工大学 Fake proof method for printing optical holographic watermark certificate
CN1960428A (en) * 2006-11-29 2007-05-09 吉林大学 Implementation method of anti printing and scanning meaningful digital watermark with large capacity

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030179902A1 (en) * 2002-01-04 2003-09-25 Ambrogio F Carl Authentication and anti-counterfeit tracking system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1421814A (en) * 2001-11-30 2003-06-04 温天 Digital anti-fake method
CN1512438A (en) * 2002-12-30 2004-07-14 北京邮电大学 File anti-fake method and its device based on digital water print
CN1710577A (en) * 2005-07-08 2005-12-21 王树勋 Digit water-mark certificate anti-fake method based on mobile communication network
CN1828666A (en) * 2006-04-12 2006-09-06 上海理工大学 Fake proof method for printing optical holographic watermark certificate
CN1960428A (en) * 2006-11-29 2007-05-09 吉林大学 Implementation method of anti printing and scanning meaningful digital watermark with large capacity

Also Published As

Publication number Publication date
CN101923701A (en) 2010-12-22

Similar Documents

Publication Publication Date Title
CN101923701B (en) Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology
JP4800553B2 (en) Certification watermark for applications related to print objects
Zhu et al. When seeing isn't believing [multimedia authentication technologies]
US7770013B2 (en) Digital authentication with digital and analog documents
CN1209730C (en) Digital anti-fake method
EP2257909B1 (en) Secure item identification and authentication system and method based on unclonable features
US8005259B2 (en) Watermarking systems and methods
EP1416440A2 (en) Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation
Han et al. Content-based image authentication: current status, issues, and challenges
CN1710577A (en) Digit water-mark certificate anti-fake method based on mobile communication network
CN107103577A (en) Half fragile uniqueness image watermark insertion and extracting method for integrity protection
Nguyen et al. A watermarking technique to secure printed matrix barcode—Application for anti-counterfeit packaging
Nguyen et al. A watermarking technique to secure printed QR codes using a statistical test
CN110503592B (en) Two-dimensional code anti-counterfeiting method and system based on digital watermark
Guru et al. Digital watermarking classification: a survey
CN101817268A (en) Application of digital watermarking in RFID technology
Tkachenko et al. Sensitivity of different correlation measures to print-and-scan process
Parameswaran et al. A robust image watermarking scheme using image moment normalization
Chahal et al. A Review on Digital Image Watermarking
JP3712392B2 (en) Manufacturing method and authentication method of card on which digital information is printed using digital watermark technology, and apparatus thereof
Tuncer et al. A watermarking application for authentication of Holy Quran
Liu et al. Wave-atoms-based multipurpose scheme via perceptual image hashing and watermarking
Chen et al. Digital image anti-counterfeiting technology
Loc et al. An Approach for Tamper-Proof QR Code Using Deep Learning Based-Data Hiding
Chen et al. Physical Anti-copying Semi-robust Random Watermarking for QR Code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120509

Termination date: 20120719